The drill bit is the most essential tool in drilling operation and optimum bit selection is one of the main challenges in planning and designing new wells. Conventional bit selections are mostly based on the historical performance of similar bits from offset wells. In addition, it is done by different techniques based on offset well logs. However, these methods are time consuming and they are not dependent on actual drilling parameters. The main objective of this study is to optimize bit selection in order to achieve maximum rate of penetration (ROP). In this work, a model that predicts the ROP was developed using artificial neural networks (ANNs) based on 19 input parameters. For the modeling part, a one-dimension mechanical earth model (1D MEM) parameters, drilling fluid properties, and rig- and bit-related parameters, were included as inputs. The optimizing process was then performed to propose the optimum drilling parameters to select the drilling bit that provides the maximum possible ROP. To achieve this, the corresponding mathematical function of the ANNs model was implemented in a procedure using the genetic algorithm (GA) to obtain operating parameters that lead to maximum ROP. The output will propose an optimal bit selection that provides the maximum ROP along with the best drilling parameters. The statistical analysis of the predicted bit types and optimum drilling parameters comparing the actual flied measured values showed a low root mean square error (RMSE), low average absolute percentage error (AAPE), and high correction coefficient (R2). The proposed methodology provides drilling engineers with more choices to determine the best-case scenario for planning and/or drilling future wells. Meanwhile, the newly developed model can be used in optimizing the drilling parameters, maximizing ROP, estimating the drilling time, and eventually reducing the total field development expenses.
|
Building Information Modeling (BIM) is becoming a great known established collaboration process in Architecture, Engineering, and Construction (AEC) industry. In various cases in many countries, potential benefits and competitive advantages have been reported. However, despite the potentials and benefits of BIM technologies, it is not applied in the construction sector in Iraq just like many other countries of the world. The purpose of this research is to understand the uses and benefits of BIM for construction projects in Iraq. This purpose has been done by establishing a fr |
Solar energy has significant advantages compared to conventional sources such as coal and natural gas, including no emissions, no need for fuel, and the potential for installation in a wide range of locations with access to sunlight. In this investigation, heterocyclic derivatives were synthesized from several porphyrin derivatives (4,4',4",4"'-(porphyrin-5,10,15,20-tetrayl) tetra benzoic acid) compound (3), obtained by reaction Pyrrole with 4-formyl benzoic acid. Subsequently, porphyrin derivative-component amides 5a, 5b, and 5c were produced by reacting compound (3) with amine derivatives at a 1:4 molar ratio. These derivatives exhibited varying sensitivities for utilization in solar cells, with compound 5a displaying the highest power
... Show MoreThe term “non-violence” is a means of political, social, and advocacy that excludes force in reaching its objectives, and lacks infringement of the rights of non-violence. The policy of non-violence is a beautiful logic of the whole of Islamic creation, in that it is an integral part of the whole structure of Islam and it is a policy of brilliant and brilliant saying in the Almighty: `` Neither level nor good or bad, pay what is better, If that between you and him enmity as if he were intimate guardian (Suratvsalat, verse: 34. Has According to the prophet of Islam, it means that God gives to kindness (kindness) what does not give to violence (Sunan Abu Dawood, 4/255). These terms accurately communicate what is meant by violence and n
... Show MoreIn this work, a joint quadrature for numerical solution of the double integral is presented. This method is based on combining two rules of the same precision level to form a higher level of precision. Numerical results of the present method with a lower level of precision are presented and compared with those performed by the existing high-precision Gauss-Legendre five-point rule in two variables, which has the same functional evaluation. The efficiency of the proposed method is justified with numerical examples. From an application point of view, the determination of the center of gravity is a special consideration for the present scheme. Convergence analysis is demonstrated to validate the current method.
With the development of modern mass media and the prevalence of use continues to both researchers and practitioners their efforts to understand how the media affect Hzha on both the individual and the institutions, society and culture as a whole, which means that the need to develop models and theories explain and predict the effects of the use of such means, therefore, the study of modern technologies of communication and information as an area of research has become mature to establish the intellectual base cohesive, but they are not mature enough, which calls for more research developments therefore become social networking sites online, (Facebook, and YouTube, and straining) known today as the new social media, which is witness
... Show MoreIn recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T
... Show MorePots experiment was conducted at the greenhouse of botanical garden belong to Department of Biology, College of Education for Pure Science, Ibn-AL-Haithum, University of Baghdad, for growth season 2018-2019. The aim of the experiment was to study the effects of foliar application of a-tocopherol concentrations (0, 50, 100, 150, 200 mg.L-1) on growth parameters and the activity of some antioxidant enzymes of wheat plant irrigated with sodium chloride concentrations (0, 75, 150, 225) mM.L-1. Salinity reduced plant growth parameter, plant height, flag leaf area, flag leaf chlorophyll content and increased the activity of antioxidant enzymes, superoxide dismutase and peroxidase. Plant growth parameters were enhanced by foliar application of a-t
... Show MoreThis paper presents a minimum delay congestion control in differentiated Service communication networks. The premium and ordinary passage services based fluid flow theory is used to build the suggested structure in high efficient manage. The established system is capable to adeptly manage both the physical network resource limitations and indefinite time delay related to networking system structure.